Google Emergency Chrome Security Update

Vivian Lee

Google has released an emergency Chrome security update for Windows, Mac and Linux to address a high severity zero-day vulnerability that is now being actively exploited.

The emergency Chrome update to version 99.0.4844.84 contains a single security fix for the zero-day attack CVE-2022-1096, which was initially disclosed on March 23.

For more information, go to Google’s Chrome Releases Blog post.

Microsoft has also confirmed that this vulnerability exists in Edge, which is a Chromium-based browser.

All Chrome and Edge users should update their browser as soon as possible.

How to update Google Chrome

In Google Chrome, go to Help > About or type chrome://settings/help directly in the address bar. If the update is available, it will automatically start downloading.

Note: It may take a few days or weeks for the update to reach everyone, so be patient if you are not seeing it yet.

Remember to restart your browser after the update has been installed or it will not activate and you will still be vulnerable to attack.

Google Chrome

Microsoft Edge

In Microsoft Edge, go to Settings and more > Help and feedback > About Microsoft Edge (edge://settings/help). If your browser version is 99.0.1150.55 or higher, it is no longer vulnerable to the CVE-2022-1096 issue.

Microsoft Edge

If you have questions, please reach out to the help desk.

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.

Other resources that might be of interest to you.

Podcast: The Basics of Cyber Resilience

 Episode Summary Cyber resilience is an evolution in mindset for the world of information security. It has been happening for years. Relying on firewalls, anti-virus, and other preventive manners at the expense of planning for what if can mean that a
Avatar photo
Conor Quinlan
>>Read More

Threat Actors: What Do I Do?

Threat Actors: Breaking It Down As a business owner, there are so many things you need to worry about on a daily basis, like employee management, product competition, and customer satisfaction. The last thing you want to think about are threat actors l
Vivian Lee
>>Read More

Unveiling the Power of Crown Jewels Analysis

The Crown Jewels Analysis In the ever-evolving world of cybersecurity, it’s easy to get lost in a sea of complex tools, software, and acronyms. One approach that has proven to be invaluable is the concept of crown jewels analysis. MITRE explains that t
Vivian Lee
>>Read More